Advertisement

Enhancing physical-layer security via big-data-aided hybrid relay selection

  • Hongliang He
  • Pinyi Ren
  • Qinghe Du
  • Li Sun
  • Yichen Wang
Research Paper

Abstract

The explosive growth in data traffic presents new challenges to the new generation of wireless communication systems, such as computing capabilities, spectrum efficiency and security. In this paper, we use the network structure, which is adaptable for the big data traffic, to improve the security of wireless networks. Specifically, a big-data aided hybrid relay selection scheme is designed and analyzed to enhance physical layer security. First, considering the ideal situation that an eavesdropper’s CSI (Channel State Information) is known to the legal nodes, we propose an optimal hybrid relay selection scheme consisting of the optimal mode selection scheme and the optimal relay selection scheme. In this case, we analyze the upper bound of an eavesdropper’s capacity in FD (Full-Duplex) mode and the secrecy outage probabilities of the optimal HD (Half-Duplex), FD, and hybrid relay selection schemes. Through the analysis of data, it is clear that the mode selection is decided by the self-interference of the FD technique. However, the instantaneous CSI of an eavesdropper is difficult to obtain due to the passive characteristic of eavesdroppers in practice. Therefore, a more practical hybrid relay selection scheme with only the channel distribution information of an eavesdropper is further studied, where a weighting factor is employed to guarantee that the hybrid mode is no worse than either the FD mode or HD mode when the self-interference grows. Finally, the simulation results show the improved security of our proposed scheme.

Keywords

Big data hybrid relay selection secrecy outage probability eavesdropper physical layer security 

References

  1. [1]
    V. N. Q. Bao, T. N. Linh, M. Debbah. Relay selection schemes for dual-hop networks under security constraints with multiple eavesdroppers [J]. IEEE transactions wireless communications, 2013, 12(12): 6076–6085.CrossRefGoogle Scholar
  2. [2]
    Y. Liu, L. Wang, T. T. Duy, et al. Relay selection for security enhancement in cognitive relay networks [J]. IEEE wireless communications letters, 2015, 4(1): 46–49.CrossRefGoogle Scholar
  3. [3]
    G. Chen, Z. Tian, Y. Gong, et al. Max-ratio relay selection in secure buffer-aided cooperative wireless networks [J]. IEEE transactions on information forensics and security, 2014, 9(4): 719–729.CrossRefGoogle Scholar
  4. [4]
    I. Krikidis, J. Thompson, S. Mclaughlin. Relay selection for secure cooperative networks with jamming [J]. IEEE transaction wireless communications, 2009, 8(10): 5003–5011.CrossRefGoogle Scholar
  5. [5]
    I. Krikidis. Opportunistic relay selection for cooperative networks with secrecy constraints [J]. IET communications, 2010, 4(15): 1787–1791.CrossRefGoogle Scholar
  6. [6]
    Y. L. Zou, X. B. Wang, W. M. Shen. Optimal relay selection for physical-layer security in cooperative wireless networks [J]. IEEE journal on selected areas in communications, 2013, 31(31): 2099–2111.CrossRefGoogle Scholar
  7. [7]
    I. Krikidis, H. A. Suraweera, C. Yuen. Amplify-andForward with full-duplex relay selection [C]//IEEE International Conference on Communications, 2012: 1–6.Google Scholar
  8. [8]
    B. Zhong, Z. Zhang, X. Chai, et al. Performance analysis for opportunistic full-duplex relay selection in underlay cognitive networks [J]. IEEE transactions on vehicular technology, 2015, 64(10): 4905–4910.CrossRefGoogle Scholar
  9. [9]
    L. Lai, H. E. Gamal. The relay-eavesdropper channel: cooperation for secrecy [J]. IEEE transactions on information theory, 2008, 54(9): 4005–4019.MathSciNetCrossRefMATHGoogle Scholar
  10. [10]
    L. Dong, Z. Han, A. Petropulu, et al. Improving wireless physical layer security via cooperating relays [J]. IEEE transactions on signal processing, 2010, 58(3): 1875–1888.MathSciNetCrossRefGoogle Scholar
  11. [11]
    J. Li, A. P. Petropulu, S. Weber. On cooperative relaying schemes for wireless physical layer security [J]. IEEE transactions on signal processing, 2011, 59(10): 4985–4997.MathSciNetCrossRefGoogle Scholar
  12. [12]
    D. S. Michalopoulos, J. Schlenker, J. Cheng, et al. Error rate analysis of full-duplex relaying [C]//International Waveform Diversity and Design Conference, 2010: 165–168.Google Scholar
  13. [13]
    Z. Ding, K. K. Leung, D. L. Goeckel, et al. On the application of cooperative transmission to secrecy communications [J]. IEEE journal on selected areas in communications, 2012, 30(2): 359–368.CrossRefGoogle Scholar
  14. [14]
    S. Bi, R. Zhang, Z. Ding, et al. Wireless communications in the era of big data [J]. IEEE communications magazine, 2011, 53(10): 190–199.CrossRefGoogle Scholar
  15. [15]
    K. Yang, Q. Yu, S. Leng, et al. Data and energy integrated communication networks for wireless big data [J]. IEEE access, 2016, 4: 713–723.CrossRefGoogle Scholar
  16. [16]
    A. A. Crdenas, P. K. Manadhata, S. P. Rajan. Big data analytics for security [J]. IEEE security & privacy, 2013, 11(6): 74–76.CrossRefGoogle Scholar
  17. [17]
    H. Alves, G. Brante, R. D. Souza, et al. On the performance of secure full-duplex relaying under composite fading channels [J]. IEEE signal processing letters, 2015, 22(7): 867–870.CrossRefGoogle Scholar
  18. [18]
    H. Alves, G. Brante, R. Souza, et al. Latva-aho M. On the performance of full-duplex relaying under phy security constraints [C]//IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2014: 1–5.Google Scholar
  19. [19]
    J. H. Lee. Full-duplex relay for enhancing physical layer security in multi-Hop relaying systems [J]. IEEE communications letters, 2015, 22(4): 525–528.CrossRefGoogle Scholar
  20. [20]
    G. Chen, Y. Gong, P. Xiao, et al. Physical layer network security in the full-duplex relay system [J]. IEEE transactions on information forensics and security, 2015, 10(3): 574–583.CrossRefGoogle Scholar
  21. [21]
    S. Parsaeefard, T. Le-Ngoc. Improving wireless secrecy rate via full-duplex relay-assisted protocols[J]. IEEE transactions on information forensics and security, 2015, 10(10): 2095–2107.CrossRefGoogle Scholar
  22. [22]
    T. Riihonen, S. Werner, R. Wichman. Hybrid fullduplex/halfduplex relaying with transmit power adaptation [J]. IEEE transactions on wireless communications, 2011, 10(9): 3074–3085.CrossRefGoogle Scholar
  23. [23]
    J. Lee, T. Q. S. Quek. Hybrid full-/half-duplex system analysis in heterogeneous wireless networks [J]. IEEE transactions on wireless communications, 2015, 14(5): 2883–2895.Google Scholar
  24. [24]
    P. Lioliou, M. Viberg, M. Coldrey, et al. Self-interference suppression in full-duplex MIMO relays [C]//Asilomar Conference on Signals, Systems and Computers Pacific Grove, 2007: 658–662.Google Scholar
  25. [25]
    T. Riihonen, S. Werner, R. Wichman, Mitigation of loopback self-interference in full-duplex MIMO relays [J]. IEEE transactions on signal processing, 2011, 59(12): 5983–5993.Google Scholar
  26. [26]
    T. Riihonen, S. Werner, R. Wichman. Optimized gain control for single-frequency relaying with loop interference [J]. IEEE transactions wireless communications, 2009, 8(6): 2801–2806.CrossRefGoogle Scholar
  27. [27]
    W. C. Yueh, S. S. Cheng. Explicit eigenvalues and inverses of several toeplitz matrices [J]. Anziam Journal, 2006, 48: 73–97.MathSciNetCrossRefMATHGoogle Scholar
  28. [28]
    A. Papoulis. Probability, random variables, and stochastic processes [M], 4th ed. New York: McGraw-Hill, 2002.MATHGoogle Scholar

Copyright information

© Posts & Telecom Press and Springer Singapore 2017

Authors and Affiliations

  • Hongliang He
    • 1
    • 2
  • Pinyi Ren
    • 1
    • 2
  • Qinghe Du
    • 1
    • 2
  • Li Sun
    • 1
    • 2
  • Yichen Wang
    • 1
    • 2
  1. 1.School of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’anChina
  2. 2.Shaanxi Smart Networks and Ubiquitous Access Research CenterXi’anChina

Personalised recommendations